Institutional Repository

Information security management: the second generation

Show simple item record

dc.contributor.author Von Solms, R
dc.contributor.editor Ram, Vevek
dc.date.accessioned 2019-05-14T13:08:05Z
dc.date.available 2019-05-14T13:08:05Z
dc.date.issued 1996
dc.identifier.citation Von Solms, R. (1996) Information security management: the second generation. Industry Meets Academia: Proceedings of the 1996 National Research and Development Conference, The South African Institute of Computer Scientists and Information Technologists, Interaction Conference Centre, University of Natal, Durban, 26 & 27 September, hosted by The Department of Computer Science and Information Systems, University of Natal, Pietermaritzburg, edited by Vevek Ram, (ISBN 0-620-20568-7). en
dc.identifier.isbn 0-620-20568-7
dc.identifier.uri http://hdl.handle.net/10500/25432
dc.description.abstract Information security has moved a long way from the early days when physical security, together with a set of backups, fonned the backbone of a company's security controls. Today, infonnation security is all about policies, standards, awareness programs, security strategies, etc. The aim of information security management efforts is to enhance confidence in the effectiveness of the information services within an organization. Unfortunately, this confidence is restricted to the organization itself and can only, with great effort, be passed on to external parties. Today, business partners need to link their computer systems for business reasons, but first want to receive some sort of proof that the other partner has got an adequate level of information security in place. A security evaluation and certification scheme that can instill confidence and assurance, regarding information security ·status, to external business parties will solve a lot of problems for the commercial world. 'This approach to Information Security Management, to proof adequate information security to external parties, is termed in this paper as; The Second Generation of Information Security Management. en
dc.language.iso en en
dc.title Information security management: the second generation en
dc.type Article en


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search UnisaIR


Browse

My Account

Statistics